Back to Results
First PageMeta Content
Auditing / Secure communication / Computer network security / Mainframe computer / Cloud computing security / Computer security / IBM System z9 / Information technology security audit / VM / Computing / Cloud computing / Centralized computing


IBM Software Thought Leadership White Paper Creating the ultimate security platform IBM System z delivers proactive protection for data, web, cloud, mobile and enterprise environments
Add to Reading List

Document Date: 2014-03-03 16:41:19


Open Document

File Size: 1,58 MB

Share Result on Facebook

Company

Itaú Unibanco / IBM Software / Forrester Research / /

Country

Germany / United States / /

Currency

USD / /

Facility

OS Integrated Cryptographic Service Facility / National Institute of Standards and Technology / IBM Resource Access Control Facility / /

IndustryTerm

mobile computing / downloadable applications / software foundation / real-time security intelligence data / secure computing platforms / web applications / social media / database infrastructure / proactive protection / mainframe computing / social media sites / software-based solutions / bank / point security solutions / encryption hardware / telecommunications / improved proactive risk management / software encryption / compliance audit / batch processing / means systems / zSecure solutions / Security management tools / compliance auditing / crypto hardware / computing / mainframe-based web servers / real-time monitoring / security management / ranging from network / cloud computing / integrated security solutions / technology trends / software solutions / access management / real-time anomaly detection / large healthcare / security devices / intrusion protection systems / security intelligence solutions / point security products / web services / /

Organization

National Institute of Standards and Technology / /

Position

systems administrator / administrator / network administrator / Se zSecure Manager / Manager for RACF / /

Product

Mainframe / Adm System / /

ProgrammingLanguage

CICS / /

Technology

encryption / Information Technology / mobile computing / data encryption / columnlevel encryption / operating system / software encryption / operating systems / mobile devices / /

SocialTag